WO2011144139A1 - Method and device for detecting internet protocol address collision in autonomous system - Google Patents

Method and device for detecting internet protocol address collision in autonomous system Download PDF

Info

Publication number
WO2011144139A1
WO2011144139A1 PCT/CN2011/075157 CN2011075157W WO2011144139A1 WO 2011144139 A1 WO2011144139 A1 WO 2011144139A1 CN 2011075157 W CN2011075157 W CN 2011075157W WO 2011144139 A1 WO2011144139 A1 WO 2011144139A1
Authority
WO
WIPO (PCT)
Prior art keywords
interface
autonomous system
address
protocol
packet
Prior art date
Application number
PCT/CN2011/075157
Other languages
French (fr)
Chinese (zh)
Inventor
刁操
张鹏
董辉
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Publication of WO2011144139A1 publication Critical patent/WO2011144139A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/50Address allocation
    • H04L61/5046Resolving address allocation conflicts; Testing of addresses

Definitions

  • the present invention relates to an Internet network of IIPP networks, and particularly relates to a self-healing mechanism mechanism for distributing distributed routing routes of a type of IIPP network. . 1100 Back Background Technique
  • IIPP ((IInntteerrnneett PPrroottooccooll Inter-connected Network Association Agreement)) Network network has achieved great success in the commercial and commercial aspects, from which the IIPP becomes It is the best choice for the best choice of today's communication and communication infrastructure. .
  • the sub-distributed dynamic dynamic path of the IIPP network is self-healing.
  • the mechanism of the machine provides the greater flexibility and expansion of the 1155, and the cocoa significantly reduces the cost of the lower deployment;; the other side, these
  • the application should be applied to the IIPP network to propose new and new requirements. It is required to provide the IIPP network to provide higher reliability and reliability performance. .
  • PPrroottooccooll The shortest short-circuit path is preferred, and the LLDDPP agreement ((LLaabbeell DDiissttrriibbuuttiioonn PPrroottooccooll labeling and distribution agreement)) Explain clearly. .
  • the local connection is assigned the same address. Since the outgoing interfaces of the device RTA to RTB and RTC are different, there is no problem for the IGP (Interior Gateway Protocol) or BGP (Border Gateway Protocol) protocol. However, it may cause calculation errors for the LDP protocol. LDP can use the next hop address plus the interface and route matching of the neighbor to find the downstream session. However, in the case of a remote session, LDP cannot find the neighbor's interface. If the addresses on the two remote neighbors are the same, the LDP cannot calculate the downstream session and the forwarding service is interrupted.
  • IGP Interior Gateway Protocol
  • BGP Border Gateway Protocol
  • the technical problem to be solved by the present invention is to overcome the deficiencies of the prior art described above, and to provide a method and device capable of detecting IP address conflicts in an autonomous system, thereby improving the maintainability and reliability of the IP network.
  • the technical solution proposed by the present invention for the above technical problem includes a method for detecting an IP address conflict in an autonomous system, the method comprising:
  • the device in the autonomous system when a new interface is enabled with the internal gateway protocol, constructs a packet carrying the IP address information of the interface of the device;
  • the internal gateway protocol may be an OSSPF protocol
  • the device in the autonomous system runs a process that supports the 0SPF protocol, and the packet includes a link state advertisement LSA (Link State Advertise).
  • LSA Link State Advertise
  • the process of constructing the LSA specifically includes: constructing a type length value TLV (Type, Length and Value type length value) carrying the interface IP address information of the device, and constructing the LSA by using the TLV.
  • TLV Type, Length and Value type length value
  • the LSA is generated when at least one interface of the device in the autonomous system is enabled to the process supporting the 0SPF protocol, and each device in the autonomous system adds a TLV to carry the device correspondingly. Interface IP address information.
  • the internal gateway protocol may be an is-is protocol, and the device in the autonomous system runs a process supporting the IS-IS protocol, and the packet includes a link state packet LSP (Link State Packets). .
  • the process of constructing the LSP specifically includes: constructing a type length value TLV carrying the interface IP address information of the device, and constructing the LSP by using the TLV.
  • the TLV is constructed when at least one interface of the device in the autonomous system is enabled to the process supporting the IS-IS protocol, and each additional device in the autonomous system will be correspondingly in the TLV. Add an interface IP address information.
  • the indication that the device in the autonomous system gives an IP address conflict in the autonomous system specifically includes:
  • the technical solution proposed by the present invention for the above technical problem further includes an apparatus capable of detecting an IP address conflict of an Internet protocol in an autonomous system, including:
  • the first module is configured to construct a packet carrying the IP address information of the interface of the device when the internal interface protocol is enabled on the new interface;
  • a second module configured to send the packet to all devices in the autonomous system, where the packet causes the device in the autonomous system to receive the packet, where the packet is received
  • the packet causes the device in the autonomous system to receive the packet, where the packet is received
  • the first module may specifically include:
  • the first unit the type length value used to construct the IP address information of the interface carrying the device
  • the second unit constructs the message with the TLV.
  • the method and device for detecting an IP address conflict in an autonomous system of the present invention can compare the IP address information of the interface with each device by including the interface IP address information in the link information packet. Checking for conflicts can quickly detect IP address conflicts in the autonomous system, thus providing the possibility to improve the maintainability and reliability of the IP network.
  • Figure 1 is a hypothetical IP address collision scenario in an autonomous system using 0SPF.
  • Figure 2 is a hypothetical IP address collision scenario in an autonomous system using LDP.
  • FIG. 3 is a flow chart of a method of detecting an IP address conflict in an autonomous system of the present invention.
  • FIG. 4 is a block diagram of an apparatus for detecting an IP address conflict in an autonomous system of the present invention.
  • Figure 5 shows an autonomous system scenario where the assumed IP addresses conflict, and the address is an IPv4 address.
  • Figure 6 shows an autonomous system scenario where the assumed IP addresses conflict, and the address is an IPv6 address.
  • FIG. 8 is a new Opaque LSA structure of the present invention used when the autonomous system shown in FIG. 6 selects the 0SPF protocol.
  • Figure 9 is a diagram showing the new TLV structure of the present invention used when the IS-IS protocol is selected for the autonomous system shown in Figure 5.
  • Figure 10 is a diagram showing the new TLV structure of the present invention used when the IS-IS protocol is selected for the autonomous system shown in Figure 6.
  • FIG. 11 is an existing TLV used when the autonomous system shown in FIG. 5 selects the IS-IS protocol.
  • FIG. 12 is an existing TLV structure used when the autonomous system shown in FIG. 6 selects the IS-IS protocol.
  • the method for detecting an IP address conflict of an Internet protocol in an autonomous system of the present invention includes:
  • Step 101 The device in the autonomous system constructs a packet carrying the IP address information of the interface of the device when the internal interface protocol is enabled on the new interface.
  • Step 102 Send the packet to all devices in the autonomous system.
  • Step 103 The packet is generated by the device in the autonomous system that receives the packet, and the packet is generated by the device other than the device itself that received the packet, and the packet is in the packet.
  • the autonomous system is given when the IP address information is the same as the interface IP address information of the device itself. An indication of an IP address conflict occurs.
  • the device for detecting an IP address conflict of an Internet protocol in an autonomous system includes:
  • the first module 1 is configured to construct a packet carrying the IP address information of the interface of the device when the internal interface protocol is enabled on the new interface.
  • a second module 2 configured to send the packet to all devices in the autonomous system, where the packet causes the device in the autonomous system to receive the packet, where the packet is received
  • the device of the packet is generated by a device other than the device itself, and the IP address information in the packet is the same as the IP address information of the device itself, an indication of an IP address conflict occurs in the autonomous system.
  • the first module 1 may specifically include:
  • the first unit 11 is configured to construct a type length value of the interface carrying the IP address information of the device.
  • the second unit 12 constructs the message with the TLV.
  • each device in the autonomous system compares the IP address information of the interface, and can detect the address conflict, thereby achieving the purpose of quickly detecting the IP address conflict of the entire network.
  • an autonomous system refers to a router and a network group under the control of a management authority. It can be a router directly connected to a LAN (Local Area Network) and also connected to the Internet (Internet); it can be a LAN connected by an enterprise backbone. All routers in an autonomous system must be connected to each other, run the same routing protocol, and assign the same autonomous system number.
  • LAN Local Area Network
  • Internet Internet
  • the IGP may be 0SPF or an IS-IS (Intermediate System to Intermediate System).
  • the IP address information can be either an IPv4 address or an IPv6 address.
  • the internal gateway protocol may use the 0SPF protocol, and the message includes a link state advertisement LSA, which is a new type of the present invention.
  • the LSA construction process may specifically include: constructing a type length value of an interface IP address information carrying the device.
  • the LSA was constructed using the TLV.
  • each interface IP address information may have a total storage space of 8 bytes, including a 4-byte address space and a 4-byte mask space; or may have a total storage space of 20 bytes. Includes a 16-byte address prefix space and a 4-byte prefix length space.
  • the internal gateway protocol may also be an IS-IS protocol, and the packet includes a link state message LSP.
  • the process of constructing the LSP specifically includes: constructing a type length value TLV carrying the interface IP address information of the device, and constructing the LSP by using the TLV.
  • the type of the TLV can be new or existing.
  • the IP address information of each interface may be 8 bytes of total storage space, including 4 bytes of address space and 4 bytes of mask space; or may have a prefix of 1 byte.
  • the length space and the prefix length space of the number of address prefix bytes determined by the prefix length.
  • the IP address information of each interface can be an IPv4 address with a length of 4 bytes, or an IPv6 address with a length of 16 bytes.
  • Example 1 Detecting IPv4 address conflicts by adding OSPF Opaque LSAs (opaque link state advertisements)
  • the IP address information is an IPv4 address, and the IGP uses 0SPF.
  • the four routers Router_A, Router_B, Router-C, and Router_D can run OSPF-enabled processes and establish 0SPF neighbor relationships.
  • the IP address configuration of the interface between Router-A and Router_D conflicts.
  • the present invention adds a new type of Opaque LSA.
  • the new LSA can be set to a type with a type value greater than 11.
  • Each device in the autonomous system that is, the routers Router-A, Router-B, Router-C, and Router-D, each add an interface, and the interface is enabled in the process that supports the 0SPF protocol running on the device.
  • a TLV is added to identify the interface, and the LSA is generated when at least one interface is enabled in the process supporting the 0SPF protocol.
  • the structure of the LSA can be based on the usual Opaque LSA structure, except that the type value is greater than 11.
  • the opaque information Opaque Information item may include multiple TLVs, and may include all interface IP address information of devices in the autonomous system.
  • the length of each interface IP address information is 8 bytes, including a 4-byte address and 4 words. The mask of the section.
  • the LSA can be flooded to all devices in the autonomous system.
  • the LSA is refreshed every 1800 seconds and flooded into the entire autonomous system.
  • the Opaque Information of the Opaque LSA generated by Router-A contains the interface address 1. 1. 1. 1, the mask length is 24 bits, and the mask value is 255. 255. 255. 0, the LSA is flooded to the routers Router-B, Router-C and Router-D.
  • the device is configured to analyze the LSAs of the Opaque LSA, and determine whether the LSAs generated by the routers are generated based on the contents of the reported advertising routers. If not generated by itself, the IP address information of the interfaces in each TLV and the interface IP address of the device are taken. If the IP address information of the interface is the same as the IP address of the interface of the device, the system sends an alarm to the NMS and records the log.
  • the Opaque LSA generated by the router Router-D is also sent to the routers Router-B, Router-C and Router-A, so that the routers Router-A and Router-D in Figure 5 will send out alarms and print log information.
  • the alarm content and log information include the router ID of the conflicting device, the id of the 0SPF area. Therefore, according to the network management alarm and log information, the administrator can quickly correct and resolve the conflict.
  • Embodiment 2 The IPv6 address conflict is detected by adding the 0SPFv3 Opaque LSA.
  • Figure 6 shows an autonomous system in which a hypothetical IP address conflicts. The address is
  • IPv6 address IGP selects 0SPF.
  • the four routers Router_A, Router_B, Router-C, and Router-D can run the 0SPFv3 process to establish the 0SPFv3 neighbor relationship.
  • the IP address configuration of the interface between Router-A and Router-D conflicts.
  • the present invention adds a new type of Opaque LSA for the 0SPv3, and the LSA is of a type with a type value greater than 11.
  • Each device in the autonomous system adds one interface, and the interface runs on the device.
  • a TLV is added to identify the interface.
  • the LSA is generated when at least one interface is enabled in the process that supports the 0SPF protocol.
  • the structure of the Opaque LSA is as shown in Figure 8.
  • the first three bits of the link state type LS Type are 010 bit strings, indicating that the flooding range is the entire autonomous system, and the link state LS type determined by other bits is greater than 11,
  • the TLV contains all the interface IP address information of the devices in the autonomous system.
  • the IPv6 address information of each interface is 20 bytes long and contains a 16-byte address prefix and a 4-byte prefix length.
  • the TLVs entry of the Opaque LSA generated by the router Router-A contains the interface address 20: : 1, the address prefix specified by the prefix length is 64 bits, and the LSA is flooded to the routers Router-B, Router-C and Router_D.
  • the device that receives the LSA parses and obtains the IP address information of the interface in the TLV, and judges according to the content of the analyzed Advertisement Router item. If the LSA is generated by itself, the IP address information of the interface in the TLV is compared with the IP address information of the interface of the device itself. If the IP address information of the interface in the TLV is equal to the IP address of the interface of the device itself. , then send an alarm to the network management system and record the log.
  • the Opaque LSA generated by the router Router-D is also sent to the router.
  • Router-B, Router-C, and Router-A so that Router-A and Router-D in Figure 6 will send out alarms and print log information.
  • the alarm content and log information include the router id of the conflicting device, the 0SPF area, and so on. information. Therefore, according to the network management alarm and log information, the administrator can quickly correct and resolve the conflict.
  • the third embodiment detects the IPv4 address conflict by adding the IS-IS IPv4 TLV. In the case of an autonomous system where the assumed IP addresses conflict, as shown in Figure 5, the address is an IPv4 address and the IGP is IS_IS.
  • the four routers Router-A, Router_B, Router-C, and Router-D can run IS-IS processes to establish IS-IS neighbor relationships. The IP address configuration of the interface between Router-A and Router-D conflicts.
  • the present invention adds a new TLV, and the name can be InterfaceAddressTLV, and its structure is as shown in FIG. 9.
  • the type of the TLV can be freely selected without being occupied by other protocols, and the TLV can be selected through this TLV.
  • the TLV is constructed when at least one interface of the device in the autonomous system is enabled to support the IS-IS protocol. Each additional interface of the device in the autonomous system adds an interface IP address information to the TLV accordingly.
  • the value in the InterfaceAddressTLV occupies 8 bytes, where the address occupies 4 bytes and the mask occupies 4 bytes.
  • An IPv4 address is added to the InterfaceAddressTLV and the LSP is refreshed.
  • the LSP is flooded to all devices in the AS.
  • the InterfaceAddressTLV in the LSP generated by Router-A contains the IP address of the interface. 1. 1. 1. The mask is occupied by 24 bits. The LSP is flooded to Router-B, Router-C, and Router_D. The device that receives the LSP resolves and obtains the IP address information of the interface in the TLV. The information is compared with the IP address information of the interface of the device. If the IP address information of an interface in the TLV is equal to the IP address of the interface of the device itself, Further compare whether the publisher of the LSP establishes an adjacency relationship with the locality, and if not, sends the network management system to the network management system. Alarm, and log.
  • the Opaque LSA generated by the router Router-D is also sent to the routers Router-B, Router-C and Router-A, so that the routers Router-A and Router-D in Figure 5 will send out alarms and print log information.
  • the alarm content and log information include the system ID of the conflicting device, the IS_IS layer level, and the area address. Therefore, the administrator can quickly correct and resolve conflicts based on network management alarms and log information.
  • Embodiment 4 The IPv6 address conflict is detected by adding an IS-IS IPv6 TLV.
  • the present invention adds a new TLV, and the name can be Ipv6InterfaceAddressTLV, and its structure is as shown in FIG. 10, and the type of the TLV can be freely selected without being occupied by other protocols, and the TLV can be selected through this TLV. Add all IPv6 host addresses on the interfaces of all devices to the LSP.
  • the TLV is constructed when at least one interface of the device in the autonomous system is enabled to support the IS-IS protocol. Each additional interface of the device in the autonomous system adds an interface IP address information to the TLV accordingly.
  • the value of the Ipv6InterfaceAddressTLV is composed of an address prefix and a prefix length, where the prefix length occupies 1 byte, and the number of bytes occupied by the address prefix is determined by the value of the prefix length.
  • Each IPv6 address is added to the interface of the device in the autonomous system.
  • An IPv6 address is added to the Ipv6InterfaceAddressTLV and the LSP is refreshed. The LSP is flooded to all devices in the AS.
  • the Ipv6InterfaceAddressTLV in the LSP generated by the router Router-A contains the interface address 20:1, and the address prefix specified by the prefix length is 64 bits.
  • the LSP is flooded to the routers Router-B, Router-C, and Router_D.
  • the device that receives the LSP parses and obtains the IP address information of the interface in the TLV. The information is compared with the IP address information of the interface of the device. If the IP address information of an interface in the TLV is the same as the IP address of the interface on the device, the publisher of the LSP is compared with the local device. , then issue an alarm to the network management system and record the log.
  • the Opaque LSA generated by the router Router-D is also sent to the router.
  • Router-B, Router-C, and Router-A, Router-A and Router-D in Figure 6 both send alarms and print log information.
  • the alarm content and log information contain the system id of the conflicting device and the IS_IS Level. Information such as the area address. Therefore, according to the network management alarm and log information, the administrator can quickly correct and resolve the conflict.
  • the fifth embodiment detects an IPv4 address conflict by using an existing IS-IS IPv4 TLV.
  • An assumed IP address conflicts as shown in FIG. 5, where the address is an IPv4 address, and the IGP selects IS_IS.
  • the four routers Router-A, Router-B, Router-C, and Router-D can run IS-IS processes to establish IS-IS neighbor relationships.
  • the present invention adopts the TLV, IP Interface Address (No. 132) defined in the RFC (Request For Comments Request for Comments) 1195, and its structure is as shown in the figure.
  • the address of the interface can be carried by this TLV, since there is no mask part, the address information carried in the TLV can only contain the address part.
  • An interface can be added to the TLV 132 and the LSP can be refreshed.
  • the LSP can be sent to all devices in the AS.
  • the 132 TLV in the LSP generated by the router Router-A contains the interface address 1. 1. 1. 1, the mask length is 24 bits, and the LSP is flooded to the routers Router-B, Router-C, and Router- D.
  • the device that receives the LSP parses and obtains the IP address information of the interface in the TLV. The information is compared with the IP address information of the interface of the device. If the IP address information of the interface in the TLV is the same as the IP address of the interface on the device, the publisher of the LSP is compared with the local device. , then send an alarm to the network management system, and record the records.
  • the Opaque LSA generated by the router Router-D is also sent to the routers Router-B, Router-C and Router-A, so that the routers Router-A and Router-D in Figure 5 will send out alarms and print log information.
  • the alarm content and log information include the system id (system number) of the conflicting device, the IS_IS Level, and the area address. Therefore, according to the network management alarm and log information, the administrator can quickly correct and resolve the conflict.
  • Embodiment 6 detects an IPv6 address conflict by using an existing IS-IS IPv6 TLV.
  • FIG. 6 An autonomous system in which a hypothetical IP address conflicts, as shown in Figure 6, where the address complies with IPv6, and IGP selects IS-ISo four routers Router-A, Router-B, Router-C, and Router-D to run support.
  • the IS-IS process establishes an IS-IS neighbor relationship.
  • the present invention adopts the TLV defined in RFC5308, IP Interface.
  • the TLV can be used to carry the interface address information, since there is no prefix length part, the address information carried in the TLV can only contain the address prefix part.
  • Each additional IPv6 address is added to the interface of the device in the autonomous system. You can add an address to the TLV 232 and refresh the LSP. The LSP is flooded to all devices in the AS.
  • the 232 TLV in the LSP generated by the router Router-A contains the interface address 20: : 1, the address prefix specified by the prefix length is 64 bits, and the LSP is flooded to the routers Router-B, Router-C, and Router_D. .
  • the device receiving the LSP parses and obtains the IP address information of the interface in the TLV. The information is compared with the IP address information of the interface of the device. If the IP address information of an interface in the TLV is the same as the IP address of the interface on the device, the publisher of the LSP is compared with the local device. , then issue an alarm to the network management system and record the log.
  • the Opaque LSA generated by the router Router-D is also flooded to Router-B, Router-C, and Router-A.
  • the routers Router-A and Router-D in Figure 6 both send alarms and print log information.
  • the alarm content and log information include the system id of the conflicting device, the IS_IS Level, and the area address. Therefore, according to the network management alarm and log information, the administrator can quickly correct and resolve the conflict.
  • the method and the device for detecting the IP address conflict in the autonomous system of the present invention carry the IP address information of the interface of the device by adding the opaque LSA type, and send the LSA to the IGP.
  • the LSP that carries the IP address information of the interface of the device is configured, and the LSP is sent to all devices in the autonomous system;
  • an address conflict can be detected, so as to quickly detect the IP address conflict of the entire network.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

Provided are a method and device for detecting Internet Protocol (IP) address collision in an autonomous system. The method includes: when a new interface enables an interior gateway protocol, a device in the autonomous system constructs a message which bears the IP address information of the interface of the device; the message is sent to all the devices in the autonomous system, and the message enables the devices which receive the message in the autonomous system to give the indication that the IP address collision occurs in the autonomous system, when the message is generated by other device other than the device itself which receives the message, and the IP address information in the message is the same as the IP address information of the interface of the device itself. The present invention can detect IP address collision in an autonomous system, thus improving the maintainability and reliability of IP networks.

Description

检测自治系统内 IP地址冲突的方法及设备 本申请要求于 2010 年 10 月 30 日提交中国专利局、 申请号为 201010525432. 6、 发明名称为 "检测自治系统内 IP 地址冲突的方法及设 Method and device for detecting IP address conflict in autonomous system This application claims to be submitted to the Chinese Patent Office on October 30, 2010, and the application number is 201010525432. 6. The invention name is "Method and Design for Detecting IP Address Conflicts in Autonomous System"
5 备" 的中国专利申请的优先权, 其全部内容通过引用结合在本申请中。 The priority of the Chinese Patent Application, the entire disclosure of which is incorporated herein by reference.
技术领域 Technical field
本本发发明明涉涉及及 IIPP网网络络,, 尤尤其其涉涉及及一一种种 IIPP网网络络的的分分布布式式路路由由的的自自愈愈机机制制。。 1100 背背景景技技术术  The present invention relates to an Internet network of IIPP networks, and particularly relates to a self-healing mechanism mechanism for distributing distributed routing routes of a type of IIPP network. . 1100 Back Background Technique
从从企企业业单单位位到到大大学学校校园园,, 从从学学术术机机构构到到电电信信运运营营商商,, 从从政政府府机机构构到到全全 球球互互联联网网,, IIPP ((IInntteerrnneett PPrroottooccooll互互联联网网协协议议)) 网网络络在在商商业业方方面面取取得得了了巨巨 大大的的成成功功,, 从从而而使使 IIPP成成为为当当今今通通信信基基础础架架构构的的最最佳佳选选择择。。 与与传传统统的的、、 面面向向 连连接接的的网网络络相相比比,, 一一方方面面,, IIPP网网络络的的分分布布式式动动态态路路由由自自愈愈机机制制提提供供更更大大的的 1155 弹弹性性和和扩扩展展性性,, 可可显显著著降降低低部部署署成成本本;; 另另一一方方面面,, 这这些些应应用用对对 IIPP网网络络提提出出 了了新新的的需需求求,, 要要求求 IIPP网网络络提提供供更更高高的的可可靠靠性性和和性性能能。。  From the single-unit enterprise of the enterprise enterprise to the campus campus of the university, from the academic institution to the telecom business operator, from the government to the global ball Internet networking, IIPP ((IInntteerrnneett PPrroottooccooll Inter-connected Network Association Agreement)) Network network has achieved great success in the commercial and commercial aspects, from which the IIPP becomes It is the best choice for the best choice of today's communication and communication infrastructure. . Compared with the network network with the traditional connection and the face-to-face connection, on one side, the sub-distributed dynamic dynamic path of the IIPP network is self-healing. The mechanism of the machine provides the greater flexibility and expansion of the 1155, and the cocoa significantly reduces the cost of the lower deployment;; the other side, these The application should be applied to the IIPP network to propose new and new requirements. It is required to provide the IIPP network to provide higher reliability and reliability performance. .
实实际际应应用用中中,, 由由于于 IIPP网网络络越越来来越越庞庞大大,, 规规划划不不合合理理或或者者误误操操作作会会导导致致 IIPP地地址址冲冲突突的的情情况况、、 出出现现 IIPP地地址址冲冲突突的的问问题题。。 这这种种情情况况排排查查困困难难,, 对对业业务务 影影响响大大,, 更更有有可可能能导导致致整整个个网网络络瘫瘫痪痪。。  In practice, it should be applied in the middle and the middle, because the network of the IIPP network is getting bigger and bigger, the planning plan is not unreasonable or the operation will be led to the IIPP. The situation of the address and the conflict situation, and the question of the conflict of the current address of the IIPP address. . It is difficult to find out the situation of this kind of situation, and it has a great impact on the business operations of the industry. More likely, it may lead to the whole network network. .
2200 下下面面以以 IIPP地地址址冲冲突突对对 00SSPPFF协协议议 ((OOppeenn SShhoorrtteesstt PPaatthh FFiirrsstt RRoouuttiinngg 2200 below the lower side to the conflict with the IIPP address address 00SSPPFF agreement ((OOppeenn SShhoorrtteesstt PPaatthh FFiirrsstt RRoouuttiinngg
PPrroottooccooll 最最短短路路径径优优先先协协议议))和和 LLDDPP协协议议 ((LLaabbeell DDiissttrriibbuuttiioonn PPrroottooccooll 标标签签分分发发协协议议)) 的的影影响响为为例例来来进进行行说说明明。。 PPrroottooccooll The shortest short-circuit path is preferred, and the LLDDPP agreement ((LLaabbeell DDiissttrriibbuuttiioonn PPrroottooccooll labeling and distribution agreement)) Explain clearly. .
(( 11 )) IIPP地地址址冲冲突突对对 00SSPPFF协协议议的的影影响响  (( 11 )) The impact of the IIPP address on the 00SSPPFF agreement
如如图图 11所所示示,, 在在一一个个自自治治系系统统中中,, 假假设设 00SSPPFF区区域域 00中中的的两两台台设设备备 RRTTEE As shown in FIG. 11 , in one self-governing system system, it is assumed that two or two sets of equipment in the 00SSPPFF area area 00 are provided with RRTTEE.
2255 和和 RRTTFF的的两两个个接接口口 IIPP地地址址配配置置重重复复了了,, 会会导导致致区区域域 00频频繁繁进进行行路路由由计计算算,, 路路由由时时通通时时断断,, 严严重重影影响响业业务务。。 其其它它区区域域,, 如如:: 区区域域 11、、 区区域域 22和和区区域域 33也也 会会频频繁繁进进行行路路由由计计算算,, 可可能能造造成成的的不不良良影影响响包包括括:: 频频繁繁路路由由计计算算,, 路路由由时时 有有时时无无;; 网网络络设设备备的的 CCPPUU 占占用用高高;; 并并且且排排查查花花费费大大量量时时间间,, 且且无无法法准准确确找找 到到故故障障点点。。2255 and two or two interface ports of RRTTFF are duplicated and reset. The routing is always interrupted from time to time, and severely severely affects the business of the business. . Other areas of its area, such as: area area 11, area area 22, and area area 33 will also frequently perform frequent routing calculations, which may result in The effects of the bad shadows are included in the following:: Frequent frequent routing is calculated by the meter, and the routing of the route is sometimes from time to time;; the CCPPUU of the network network equipment is occupied by high occupancy. ;; and also the time and cost of the large amount of time, and there is no way to accurately find the fault point. .
Figure imgf000003_0001
Figure imgf000003_0001
如如图图 22所所示示,,在在一一个个自自治治系系统统中中,,假假设设两两台台设设备备 RRTTBB和和 RRTTCC在在配配置置 IIPPvv66 地址时, 本地连接分配成了相同地址, 由于设备 RTA到 RTB和 RTC的出接 口不同, 所以对于 IGP ( Interior Gateway Protocol 内部网关协议) 或 BGP (Border Gateway Protocol边界网关协议) 协议来说没有问题, 但是 对于 LDP协议来说可能会造成计算错误。 LDP可以使用下一跳地址加上发现 该邻居的接口和路由匹配, 得出下游会话。 但是在远端会话的情况下, LDP 没法发现邻居的接口, 这时如果两个远端邻居上的地址相同, 将导致 LDP 不能计算出下游会话, 转发业务中断。 As shown in FIG. 22, in one self-governing system system, it is assumed that two or two sets of equipment are provided for the RRTTBB and the RRTTCC are disposed in the configuration IIPPvv66. At the address, the local connection is assigned the same address. Since the outgoing interfaces of the device RTA to RTB and RTC are different, there is no problem for the IGP (Interior Gateway Protocol) or BGP (Border Gateway Protocol) protocol. However, it may cause calculation errors for the LDP protocol. LDP can use the next hop address plus the interface and route matching of the neighbor to find the downstream session. However, in the case of a remote session, LDP cannot find the neighbor's interface. If the addresses on the two remote neighbors are the same, the LDP cannot calculate the downstream session and the forwarding service is interrupted.
可见, 在自治系统中, 检测 IP地址冲突对于提高 IP网络可维护性和 可靠性是非常有帮助的。 发明内容  It can be seen that in an autonomous system, detecting IP address conflicts is very helpful for improving the maintainability and reliability of IP networks. Summary of the invention
本发明要解决的技术问题在于克服上述现有技术存在的不足, 而提出 一种能够在自治系统中检测 IP地址冲突, 从而提高 IP网络可维护性和可 靠性的方法及设备。  The technical problem to be solved by the present invention is to overcome the deficiencies of the prior art described above, and to provide a method and device capable of detecting IP address conflicts in an autonomous system, thereby improving the maintainability and reliability of the IP network.
本发明针对上述技术问题而提出的技术方案包括, 提出一种检测自治 系统内 IP地址冲突的方法, 该方法包括:  The technical solution proposed by the present invention for the above technical problem includes a method for detecting an IP address conflict in an autonomous system, the method comprising:
所述自治系统内的设备, 在有新的接口使能内部网关协议时, 构建承 载有所述设备的接口 IP地址信息的报文;  The device in the autonomous system, when a new interface is enabled with the internal gateway protocol, constructs a packet carrying the IP address information of the interface of the device;
将所述报文发送给所述自治系统内的所有设备, 所述报文使所述自治 系统内接收到所述报文的设备, 在所述报文是收到所述报文的设备自身之 外的其他设备生成, 并且所述报文中的 IP地址信息与所述设备自身的接口 IP地址信息相同时, 给出所述自治系统内出现 IP地址冲突的指示。  Transmitting the packet to all devices in the autonomous system, where the packet is used by the device in the autonomous system to receive the packet, where the packet is the device that receives the packet. When other devices are generated, and the IP address information in the packet is the same as the interface IP address information of the device itself, an indication of an IP address conflict in the autonomous system is given.
在本发明中, 所述内部网关协议可以为 0SPF协议, 所述自治系统内的 设备运行有支持 0SPF协议的进程, 所述报文包括链路状态通告 LSA (Link State Advertise )。  In the present invention, the internal gateway protocol may be an OSSPF protocol, and the device in the autonomous system runs a process that supports the 0SPF protocol, and the packet includes a link state advertisement LSA (Link State Advertise).
所述的 LSA的构建过程具体包括: 构建承载有该设备的接口 IP地址信 息的类型长度值 TLV (Type, Length and Value类型长度值), 用所述 TLV 构建 LSA。  The process of constructing the LSA specifically includes: constructing a type length value TLV (Type, Length and Value type length value) carrying the interface IP address information of the device, and constructing the LSA by using the TLV.
所述 LSA在所述自治系统内的设备的至少一个接口使能到所述的支持 0SPF协议的进程时产生, 所述自治系统内的设备每增加一个接口将相应地 在增加一个 TLV来承载设备的接口 IP地址信息。 在本发明中, 所述内部网关协议可以为 is-is协议, 所述自治系统内 的设备运行有支持 IS-IS协议的进程,所述报文包括链路状态报文 LSP(Link State Packets )。 The LSA is generated when at least one interface of the device in the autonomous system is enabled to the process supporting the 0SPF protocol, and each device in the autonomous system adds a TLV to carry the device correspondingly. Interface IP address information. In the present invention, the internal gateway protocol may be an is-is protocol, and the device in the autonomous system runs a process supporting the IS-IS protocol, and the packet includes a link state packet LSP (Link State Packets). .
所述的 LSP的构建过程具体包括: 构建承载有该设备的接口 IP地址信 息的类型长度值 TLV, 用所述 TLV构建 LSP。  The process of constructing the LSP specifically includes: constructing a type length value TLV carrying the interface IP address information of the device, and constructing the LSP by using the TLV.
所述 TLV在所述自治系统内的设备的至少一个接口使能到所述的支持 IS-IS协议的进程时构建,所述自治系统内的设备每增加一个接口将相应地 在所述 TLV中增加一项接口 IP地址信息。  The TLV is constructed when at least one interface of the device in the autonomous system is enabled to the process supporting the IS-IS protocol, and each additional device in the autonomous system will be correspondingly in the TLV. Add an interface IP address information.
在本发明中, 所述自治系统内的设备给出所述自治系统内出现 IP地址 冲突的指示具体包括:  In the present invention, the indication that the device in the autonomous system gives an IP address conflict in the autonomous system specifically includes:
向网管系统给出告警;  Give an alarm to the network management system;
在设备上记录日志; 或  Log on the device; or
向网管系统给出告警并在设备上记录日志。  Give an alarm to the NMS and log the device.
本发明针对上述技术问题而提出的技术方案还包括, 提出一种能够检 测自治系统内互联网协议 IP地址冲突的设备, 包括:  The technical solution proposed by the present invention for the above technical problem further includes an apparatus capable of detecting an IP address conflict of an Internet protocol in an autonomous system, including:
第一模块, 用以在有新的接口使能内部网关协议时, 构建承载有所述 设备的接口 IP地址信息的报文;  The first module is configured to construct a packet carrying the IP address information of the interface of the device when the internal interface protocol is enabled on the new interface;
第二模块, 用以将所述报文发送给所述自治系统内的所有设备, 所述 报文使所述自治系统内接收到所述报文的设备, 在所述报文是收到所述报 文的设备自身之外的其他设备生成, 并且所述报文中的 IP地址信息与所述 设备自身的接口 IP地址信息相同时, 给出所述自治系统内出现 IP地址冲 突的指示。  a second module, configured to send the packet to all devices in the autonomous system, where the packet causes the device in the autonomous system to receive the packet, where the packet is received When the device other than the device itself is generated, and the IP address information in the packet is the same as the interface IP address information of the device itself, an indication of an IP address conflict in the autonomous system is given.
在本发明中, 所述第一模块可以具体包括:  In the present invention, the first module may specifically include:
第一单元, 用以构建承载有该设备的接口 IP 地址信息的类型长度值 The first unit, the type length value used to construct the IP address information of the interface carrying the device
TLV; TLV;
第二单元, 用所述 TLV构建所述的报文。  The second unit constructs the message with the TLV.
与现有技术相比,本发明的检测自治系统内 IP地址冲突的方法及设备, 通过在链路信息报文包含带有接口 IP地址信息,每台设备能够进行接口 IP 地址信息的对比, 以检查冲突, 可快速检测出自治系统内的 IP地址冲突, 从而为提高 IP网络可维护性和可靠性提供了可能。 附图说明 Compared with the prior art, the method and device for detecting an IP address conflict in an autonomous system of the present invention can compare the IP address information of the interface with each device by including the interface IP address information in the link information packet. Checking for conflicts can quickly detect IP address conflicts in the autonomous system, thus providing the possibility to improve the maintainability and reliability of the IP network. DRAWINGS
图 1是一种假设的采用 0SPF的自治系统中的 IP地址冲突情形。  Figure 1 is a hypothetical IP address collision scenario in an autonomous system using 0SPF.
图 2是一种假设的采用 LDP的自治系统中的 IP地址冲突情形。  Figure 2 is a hypothetical IP address collision scenario in an autonomous system using LDP.
图 3是本发明的检测自治系统内 IP地址冲突的方法的流程图。  3 is a flow chart of a method of detecting an IP address conflict in an autonomous system of the present invention.
图 4是本发明的检测自治系统内 IP地址冲突的设备的框图。  4 is a block diagram of an apparatus for detecting an IP address conflict in an autonomous system of the present invention.
图 5是一种假设的 IP地址发生冲突的自治系统情形, 地址是 IPv4地 址。  Figure 5 shows an autonomous system scenario where the assumed IP addresses conflict, and the address is an IPv4 address.
图 6是一种假设的 IP地址发生冲突的自治系统情形, 地址是 IPv6地 址。  Figure 6 shows an autonomous system scenario where the assumed IP addresses conflict, and the address is an IPv6 address.
图 7是图 5所示的自治系统选用 0SPF协议时, 所采用的本发明新增的 7 is a new addition of the present invention when the autonomous system shown in FIG. 5 selects the 0SPF protocol.
Opaque LSA结构。 Opaque LSA structure.
图 8是图 6所示的自治系统选用 0SPF协议时, 所采用的本发明新增的 Opaque LSA结构。  FIG. 8 is a new Opaque LSA structure of the present invention used when the autonomous system shown in FIG. 6 selects the 0SPF protocol.
图 9是图 5所示的自治系统选用 IS-IS协议时, 所采用的本发明新增 的 TLV结构。  Figure 9 is a diagram showing the new TLV structure of the present invention used when the IS-IS protocol is selected for the autonomous system shown in Figure 5.
图 10是图 6所示的自治系统选用 IS-IS协议时, 所采用的本发明新增 的 TLV结构。  Figure 10 is a diagram showing the new TLV structure of the present invention used when the IS-IS protocol is selected for the autonomous system shown in Figure 6.
图 11是图 5所示的自治系统选用 IS-IS协议时, 所采用的现有的 TLV 图 12是图 6所示的自治系统选用 IS-IS协议时, 所采用的现有的 TLV 结构。 具体实施方式  FIG. 11 is an existing TLV used when the autonomous system shown in FIG. 5 selects the IS-IS protocol. FIG. 12 is an existing TLV structure used when the autonomous system shown in FIG. 6 selects the IS-IS protocol. detailed description
以下结合附图, 对本发明予以进一步地详尽阐述。  The invention will be further elaborated below in conjunction with the drawings.
本发明的检测自治系统内互联网协议 IP地址冲突的方法,如图 3所示, 包括:  The method for detecting an IP address conflict of an Internet protocol in an autonomous system of the present invention, as shown in FIG. 3, includes:
步骤 101 :所述自治系统内的设备,在有新的接口使能内部网关协议时, 构建承载有所述设备的接口 IP地址信息的报文;  Step 101: The device in the autonomous system constructs a packet carrying the IP address information of the interface of the device when the internal interface protocol is enabled on the new interface.
步骤 102: 将所述报文发送给所述自治系统内的所有设备;  Step 102: Send the packet to all devices in the autonomous system.
步骤 103: 所述报文使所述自治系统内接收到所述报文的设备, 在所述 报文是收到所述报文的设备自身之外的其他设备生成, 并且所述报文中的 IP地址信息与所述设备自身的接口 IP地址信息相同时,给出所述自治系统 内出现 IP地址冲突的指示。 Step 103: The packet is generated by the device in the autonomous system that receives the packet, and the packet is generated by the device other than the device itself that received the packet, and the packet is in the packet. The autonomous system is given when the IP address information is the same as the interface IP address information of the device itself. An indication of an IP address conflict occurs.
本发明的检测自治系统内互联网协议 IP地址冲突的设备,如图 4所示, 包括:  The device for detecting an IP address conflict of an Internet protocol in an autonomous system, as shown in FIG. 4, includes:
第一模块 1, 用以在有新的接口使能内部网关协议时, 构建承载有所述 设备的接口 IP地址信息的报文;  The first module 1 is configured to construct a packet carrying the IP address information of the interface of the device when the internal interface protocol is enabled on the new interface.
第二模块 2, 用以将所述报文发送给所述自治系统内的所有设备, 所述 报文使所述自治系统内接收到所述报文的设备, 在所述报文是收到所述报 文的设备自身之外的其他设备生成, 并且所述报文中的 IP地址信息与所述 设备自身的接口 IP地址信息相同时, 给出所述自治系统内出现 IP地址冲 突的指示。  a second module 2, configured to send the packet to all devices in the autonomous system, where the packet causes the device in the autonomous system to receive the packet, where the packet is received When the device of the packet is generated by a device other than the device itself, and the IP address information in the packet is the same as the IP address information of the device itself, an indication of an IP address conflict occurs in the autonomous system. .
所述第一模块 1可以具体包括:  The first module 1 may specifically include:
第一单元 11,用以构建承载有该设备的接口 IP地址信息的类型长度值 The first unit 11 is configured to construct a type length value of the interface carrying the IP address information of the device.
TLV; TLV;
第二单元 12, 用所述 TLV构建所述的报文。  The second unit 12 constructs the message with the TLV.
可见, 本发明通过在报文中携带接口 IP地址信息, 让自治系统内的每 台设备对接口 IP地址信息进行对比, 可以检测出地址冲突, 从而达到快速 检测全网 IP地址冲突的目的。  It can be seen that, by carrying the interface IP address information in the packet, each device in the autonomous system compares the IP address information of the interface, and can detect the address conflict, thereby achieving the purpose of quickly detecting the IP address conflict of the entire network.
在本发明中, 自治系统是指处于一个管理机构控制之下的路由器和网 络群组。 它可以是一个路由器直接连接到一个 LAN (Local Area Network局 域网) 上, 同时也连到 Internet (互联网) 上; 它可以是一个由企业骨干 网互连的多个局域网。 在一个自治系统中的所有路由器必须相互连接, 运 行相同的路由协议, 同时分配同一个自治系统编号。  In the present invention, an autonomous system refers to a router and a network group under the control of a management authority. It can be a router directly connected to a LAN (Local Area Network) and also connected to the Internet (Internet); it can be a LAN connected by an enterprise backbone. All routers in an autonomous system must be connected to each other, run the same routing protocol, and assign the same autonomous system number.
在本发明中, IGP可以是 0SPF, 也可以是 IS-IS ( Intermediate System to Intermediate System 中间系统到中间系统)。 IP地址信息可以是 IPv4 地址, 也可以是 IPv6地址。  In the present invention, the IGP may be 0SPF or an IS-IS (Intermediate System to Intermediate System). The IP address information can be either an IPv4 address or an IPv6 address.
在本发明下面的具体实施例中, 该内部网关协议可以选用 0SPF协议, 该报文包括链路状态通告 LSA, 该 LSA是本发明新增的类型。该 LSA的构建 过程具体可以包括: 构建承载有该设备的接口 IP 地址信息的类型长度值 In the following specific embodiments of the present invention, the internal gateway protocol may use the 0SPF protocol, and the message includes a link state advertisement LSA, which is a new type of the present invention. The LSA construction process may specifically include: constructing a type length value of an interface IP address information carrying the device.
TLV, 用所述 TLV构建 LSA。 TLV, the LSA was constructed using the TLV.
在该 LSA中, 每个接口 IP地址信息可以是具有 8字节的总存储空间, 包括 4字节的地址空间和 4字节的掩码空间; 也可以是具有 20字节的总存 储空间, 包括 16字节的地址前缀空间和 4字节的前缀长度空间。 在本发明下面的具体实施例中, 该内部网关协议还可以选用 IS-IS协 议, 该报文包括链路状态报文 LSP。所述的 LSP的构建过程具体包括: 构建 承载有该设备的接口 IP地址信息的类型长度值 TLV, 用所述 TLV构建 LSP。 该 TLV的类型可以是新增的, 也可以是沿用现有的。 In the LSA, each interface IP address information may have a total storage space of 8 bytes, including a 4-byte address space and a 4-byte mask space; or may have a total storage space of 20 bytes. Includes a 16-byte address prefix space and a 4-byte prefix length space. In the following specific embodiments of the present invention, the internal gateway protocol may also be an IS-IS protocol, and the packet includes a link state message LSP. The process of constructing the LSP specifically includes: constructing a type length value TLV carrying the interface IP address information of the device, and constructing the LSP by using the TLV. The type of the TLV can be new or existing.
对于 TLV是新增的情况, 每个接口 IP地址信息可以是具有 8字节的总 存储空间, 包括 4字节的地址空间和 4字节的掩码空间; 也可以是具有 1 字节的前缀长度空间和由该前缀长度确定的地址前缀字节数的前缀长度空 间。  For the case where the TLV is new, the IP address information of each interface may be 8 bytes of total storage space, including 4 bytes of address space and 4 bytes of mask space; or may have a prefix of 1 byte. The length space and the prefix length space of the number of address prefix bytes determined by the prefix length.
对于 TLV是沿用现有的情况, 每个接口 IP地址信息可以是 IPv4地址, 具有 4字节的长度; 或者是 IPv6地址, 具有 16字节的长度。  For the TLV, the IP address information of each interface can be an IPv4 address with a length of 4 bytes, or an IPv6 address with a length of 16 bytes.
以下通过多个实施例, 予以进一步说明。 实施例一 通过新增 OSPF Opaque LSA (不透明链路状态通告)来检测 IPv4地址冲突  The following is further illustrated by a plurality of embodiments. Example 1 Detecting IPv4 address conflicts by adding OSPF Opaque LSAs (opaque link state advertisements)
一种假设的 IP地址发生冲突的自治系统情形, 如图 5所示, 其中接口 An autonomous system situation in which a hypothetical IP address conflicts, as shown in Figure 5, where the interface
IP地址信息是 IPv4地址, IGP选用 0SPF。四台路由器 Router_A、 Router_B、 Router-C和 Router_D上可运行支持 OSPF协议的进程,建立 0SPF邻居关系。 路由器 Router-A和 Router_D的接口 IP地址配置冲突了。 The IP address information is an IPv4 address, and the IGP uses 0SPF. The four routers Router_A, Router_B, Router-C, and Router_D can run OSPF-enabled processes and establish 0SPF neighbor relationships. The IP address configuration of the interface between Router-A and Router_D conflicts.
本发明为检测出该冲突, 新增加了一类 Opaque LSA, 考虑到类型值小 于等于 11的 LSA已被使用, 该新增 LSA可设定为类型值大于 11的类型。 该自治系统中的每个设备, 也就是路由器 Router-A、 Router-B, Router-C 和 Router-D, 每新增一接口, 并且该接口在设备所运行的支持 0SPF协议的 进程中使能, 就添加一个 TLV来标识该接口, 该 LSA在支持 0SPF协议的进 程中存在使能了的至少一个接口时产生。  In order to detect the conflict, the present invention adds a new type of Opaque LSA. Considering that an LSA with a type value less than or equal to 11 has been used, the new LSA can be set to a type with a type value greater than 11. Each device in the autonomous system, that is, the routers Router-A, Router-B, Router-C, and Router-D, each add an interface, and the interface is enabled in the process that supports the 0SPF protocol running on the device. , a TLV is added to identify the interface, and the LSA is generated when at least one interface is enabled in the process supporting the 0SPF protocol.
该 LSA的结构, 如图 7所示, 可以采用通常的 Opaque LSA结构, 只是 类型值大于 11。 其中, 不透明信息 Opaque Information项可以包括多个 TLV, 从而可以包含自治系统内的设备的所有接口 IP地址信息, 每个接口 IP地址信息的长度为 8字节, 包含 4字节的地址和 4字节的掩码。  The structure of the LSA, as shown in Figure 7, can be based on the usual Opaque LSA structure, except that the type value is greater than 11. The opaque information Opaque Information item may include multiple TLVs, and may include all interface IP address information of devices in the autonomous system. The length of each interface IP address information is 8 bytes, including a 4-byte address and 4 words. The mask of the section.
自治系统内的设备每增加一个接口, 就重新产生一次上述的 Opaque LSA, 该 LSA可以通过洪泛的方式发送到自治系统内的所有设备。  Each time an interface is added to a device in an autonomous system, the above Opaque LSA is regenerated. The LSA can be flooded to all devices in the autonomous system.
通常, 该 LSA每隔 1800秒刷新一次, 洪泛到整个自治系统中。  Usually, the LSA is refreshed every 1800 seconds and flooded into the entire autonomous system.
在图 5中,路由器 Router-A产生的 Opaque LSA的 Opaque Information 项中包含接口地址 1. 1. 1. 1, 掩码长度为 24位, 掩码值为 255. 255. 255. 0, 该 LSA洪泛给路由器 Router-B, Router-C和 Router-D。收到该 Opaque LSA 的各设备解析 LSA, 根据解析出来的通告路由器 Advertising Router项的 内容判断是否为自己生成的 LSA, 如果不是自己生成的, 取各个 TLV中的接 口 IP地址信息与设备自身接口 IP地址信息进行比较, 如果某个 TLV中的 接口 IP地址信息与设备自身接口 IP地址信息相等, 则给网管系统发出告 警, 并记录日志。 In Figure 5, the Opaque Information of the Opaque LSA generated by Router-A The entry contains the interface address 1. 1. 1. 1, the mask length is 24 bits, and the mask value is 255. 255. 255. 0, the LSA is flooded to the routers Router-B, Router-C and Router-D. The device is configured to analyze the LSAs of the Opaque LSA, and determine whether the LSAs generated by the routers are generated based on the contents of the reported advertising routers. If not generated by itself, the IP address information of the interfaces in each TLV and the interface IP address of the device are taken. If the IP address information of the interface is the same as the IP address of the interface of the device, the system sends an alarm to the NMS and records the log.
类似地, 路由器 Router-D 产生的 Opaque LSA 也会发送给路由器 Router-B, Router-C和 Router-A,从而图 5中的路由器 Router-A和 Router-D 都会发出告警, 并打印日志信息, 告警内容和日志信息包含冲突设备的路 由器编号 Router id, 所属 0SPF区域等信息。 从而, 管理人员根据网管告 警及日志信息, 可以快速地进行纠正, 解决冲突。 实施例二 通过新增 0SPFv3 Opaque LSA来检测 IPv6地址冲突 图 6所示为一种假设的 IP地址发生冲突的自治系统情形, 其中地址为 Similarly, the Opaque LSA generated by the router Router-D is also sent to the routers Router-B, Router-C and Router-A, so that the routers Router-A and Router-D in Figure 5 will send out alarms and print log information. The alarm content and log information include the router ID of the conflicting device, the id of the 0SPF area. Therefore, according to the network management alarm and log information, the administrator can quickly correct and resolve the conflict. Embodiment 2 The IPv6 address conflict is detected by adding the 0SPFv3 Opaque LSA. Figure 6 shows an autonomous system in which a hypothetical IP address conflicts. The address is
IPv6地址, IGP选用 0SPF。 四台路由器 Router_A、 Router_B、 Router-C和 Router-D可运行支持 0SPF协议的进程, 建立 0SPFv3 邻居关系。 路由器 Router-A和 Router-D的接口 IP地址配置冲突了。 IPv6 address, IGP selects 0SPF. The four routers Router_A, Router_B, Router-C, and Router-D can run the 0SPFv3 process to establish the 0SPFv3 neighbor relationship. The IP address configuration of the interface between Router-A and Router-D conflicts.
本发明为检测出该冲突, 针对 0SPv3新增加了一类 Opaque LSA, LSA 为类型值大于 11的类型, 该自治系统中的每个设备, 每新增一接口, 并且 该接口在设备所运行的支持 0SPF协议的进程中使能, 就添加一个 TLV来标 识该接口, 该 LSA在支持 0SPF协议的进程中存在使能了的至少一个接口时 产生。  In order to detect the conflict, the present invention adds a new type of Opaque LSA for the 0SPv3, and the LSA is of a type with a type value greater than 11. Each device in the autonomous system adds one interface, and the interface runs on the device. When the process that supports the 0SPF protocol is enabled, a TLV is added to identify the interface. The LSA is generated when at least one interface is enabled in the process that supports the 0SPF protocol.
Opaque LSA的结构如图 8所示, 其中, 链路状态类型 LS Type项的前 3位为 010位串, 表示其洪泛范围为整个自治系统, 其它位确定的链路状态 LS类型大于 11, TLV中包含自治系统内的设备的所有接口 IP地址信息, 每个接口的 IPv6地址信息的长度为 20字节, 包含 16字节地址前缀和 4字 节的前缀长度。  The structure of the Opaque LSA is as shown in Figure 8. The first three bits of the link state type LS Type are 010 bit strings, indicating that the flooding range is the entire autonomous system, and the link state LS type determined by other bits is greater than 11, The TLV contains all the interface IP address information of the devices in the autonomous system. The IPv6 address information of each interface is 20 bytes long and contains a 16-byte address prefix and a 4-byte prefix length.
在图 6中, 路由器 Router-A产生的 Opaque LSA的 TLVs项中包含接口 地址 20 : : 1, 由前缀长度规定的地址前缀为 64位, 该 LSA洪泛给路由器 Router-B, Router-C和 Router_D。 收到该 LSA的设备解析并获取到 TLV中 的接口 IP地址信息, 根据解析出来的 Advertising Router项的内容判断 是否为自己生成的 LSA, 如果不是自己生成的, 取各个 TLV中的接口 IP地 址信息与设备自身接口 IP地址信息进行比较, 如果某个 TLV中的接口 IP 地址信息与设备自身接口 IP地址信息相等, 则给网管系统发出告警, 并记 录日志。 In Figure 6, the TLVs entry of the Opaque LSA generated by the router Router-A contains the interface address 20: : 1, the address prefix specified by the prefix length is 64 bits, and the LSA is flooded to the routers Router-B, Router-C and Router_D. The device that receives the LSA parses and obtains the IP address information of the interface in the TLV, and judges according to the content of the analyzed Advertisement Router item. If the LSA is generated by itself, the IP address information of the interface in the TLV is compared with the IP address information of the interface of the device itself. If the IP address information of the interface in the TLV is equal to the IP address of the interface of the device itself. , then send an alarm to the network management system and record the log.
类似地, 路由器 Router-D 产生的 Opaque LSA 也会发送给路由器 Similarly, the Opaque LSA generated by the router Router-D is also sent to the router.
Router-B, Router-C和 Router-A,从而图 6中的路由器 Router-A和 Router-D 都会发出告警, 并打印日志信息, 告警内容和日志信息包含冲突设备的 Router id, 所属 0SPF 区域等信息。 从而, 管理人员根据网管告警及日志 信息, 可以快速地进行纠正, 解决冲突。 实施例三 通过新增 IS-IS的 IPv4 TLV来检测 IPv4地址冲突 一种假设的 IP地址发生冲突的自治系统情形, 如图 5所示, 其中地址 为 IPv4地址, IGP选用 IS_IS。四台路由器 Router-A、 Router_B、 Router-C 和 Router-D可运行支持 IS-IS协议的进程, 建立 IS-IS邻居关系。 路由器 Router-A和 Router-D的接口 IP地址配置冲突了。 Router-B, Router-C, and Router-A, so that Router-A and Router-D in Figure 6 will send out alarms and print log information. The alarm content and log information include the router id of the conflicting device, the 0SPF area, and so on. information. Therefore, according to the network management alarm and log information, the administrator can quickly correct and resolve the conflict. The third embodiment detects the IPv4 address conflict by adding the IS-IS IPv4 TLV. In the case of an autonomous system where the assumed IP addresses conflict, as shown in Figure 5, the address is an IPv4 address and the IGP is IS_IS. The four routers Router-A, Router_B, Router-C, and Router-D can run IS-IS processes to establish IS-IS neighbor relationships. The IP address configuration of the interface between Router-A and Router-D conflicts.
本发明为检测出该冲突, 新增加了一种 TLV , 名称可以为 InterfaceAddressTLV, 其结构如图 9所示, TLV的类型在保证没有被其他 协议占用的情况下可以随意选定, 通过这个 TLV可以将自治系统中所有设 备的接口上的 IPv4主机地址全部添加到 LSP中。  In order to detect the conflict, the present invention adds a new TLV, and the name can be InterfaceAddressTLV, and its structure is as shown in FIG. 9. The type of the TLV can be freely selected without being occupied by other protocols, and the TLV can be selected through this TLV. Add all IPv4 host addresses on the interfaces of all devices in the AS to the LSP.
该 TLV在自治系统内的设备的至少一个接口使能到支持 IS-IS协议的 进程时构建, 自治系统内的设备每增加一个接口将相应地在 TLV 中增加一 项接口 IP地址信息。  The TLV is constructed when at least one interface of the device in the autonomous system is enabled to support the IS-IS protocol. Each additional interface of the device in the autonomous system adds an interface IP address information to the TLV accordingly.
该 InterfaceAddressTLV中的值占用 8字节, 其中, 地址占用 4字节, 掩码占用 4字节。 自治系统内的设备的接口上每增加一个 IPv4地址, 就在 InterfaceAddressTLV中添加一项 IPv4地址信息, 并刷新 LSP, 该 LSP通 过洪泛的方式, 可发送到自治系统内的所有设备。  The value in the InterfaceAddressTLV occupies 8 bytes, where the address occupies 4 bytes and the mask occupies 4 bytes. An IPv4 address is added to the InterfaceAddressTLV and the LSP is refreshed. The LSP is flooded to all devices in the AS.
在图 5中, 路由器 Router-A产生的 LSP中的 InterfaceAddressTLV包 含接口 IP地址 1. 1. 1. 1,掩码占用为 24位,该 LSP洪泛给路由器 Router-B、 Router-C和 Router_D。 收到该 LSP的设备解析并获取到 TLV中的接口 IP 地址信息, 这些信息会与设备自身接口 IP地址信息进行比较, 如果 TLV中 的某项接口 IP地址信息与设备自身接口 IP地址信息相等, 进一步比较该 LSP的发布者是否与本地建立了邻接关系, 如果没有, 那么给网管系统发出 告警, 并记录日志。 In Figure 5, the InterfaceAddressTLV in the LSP generated by Router-A contains the IP address of the interface. 1. 1. 1. The mask is occupied by 24 bits. The LSP is flooded to Router-B, Router-C, and Router_D. The device that receives the LSP resolves and obtains the IP address information of the interface in the TLV. The information is compared with the IP address information of the interface of the device. If the IP address information of an interface in the TLV is equal to the IP address of the interface of the device itself, Further compare whether the publisher of the LSP establishes an adjacency relationship with the locality, and if not, sends the network management system to the network management system. Alarm, and log.
类似地, 路由器 Router-D 产生的 Opaque LSA 也会发送给路由器 Router-B, Router-C和 Router-A,从而图 5中的路由器 Router-A和 Router-D 都会发出告警, 并打印日志信息, 告警内容和日志信息包含冲突设备的系 统编号 System id, 所属 IS_IS层 Level、 区域地址等信息。 从而, 管理人 员根据网管告警及日志信息, 可以快速地进行纠正, 解决冲突。 实施例四 通过新增 IS-IS IPv6 TLV来检测 IPv6地址冲突。  Similarly, the Opaque LSA generated by the router Router-D is also sent to the routers Router-B, Router-C and Router-A, so that the routers Router-A and Router-D in Figure 5 will send out alarms and print log information. The alarm content and log information include the system ID of the conflicting device, the IS_IS layer level, and the area address. Therefore, the administrator can quickly correct and resolve conflicts based on network management alarms and log information. Embodiment 4 The IPv6 address conflict is detected by adding an IS-IS IPv6 TLV.
一种假设的 IP地址发生冲突的自治系统情形, 如图 6所示, 其中地址 为 IPv6地址, IGP选用 IS_IS。四台路由器 Router_A、 Router-B, Router-C 和 Router-D可运行支持 IS-IS协议的进程, 建立 IS-IS邻居关系。 路由器 Router-A和 Router-D的接口 IP地址配置冲突了。  An autonomous system in which a hypothetical IP address conflicts, as shown in Figure 6, where the address is an IPv6 address and the IGP uses IS_IS. Four routers Router_A, Router-B, Router-C, and Router-D can run IS-IS processes to establish IS-IS neighbor relationships. The IP address configuration of the interface between Router-A and Router-D conflicts.
本发明为检测出该冲突, 新增加了一种 TLV , 名称可以为 Ipv6InterfaceAddressTLV, 其结构如图 10所示, TLV的类型在保证没有 被其他协议占用的情况下可以随意选定, 通过这个 TLV可以将所有设备的 接口上的 IPv6主机地址全部添加到 LSP中。  In order to detect the conflict, the present invention adds a new TLV, and the name can be Ipv6InterfaceAddressTLV, and its structure is as shown in FIG. 10, and the type of the TLV can be freely selected without being occupied by other protocols, and the TLV can be selected through this TLV. Add all IPv6 host addresses on the interfaces of all devices to the LSP.
该 TLV在自治系统内的设备的至少一个接口使能到支持 IS-IS协议的 进程时构建, 自治系统内的设备每增加一个接口将相应地在 TLV 中增加一 项接口 IP地址信息。  The TLV is constructed when at least one interface of the device in the autonomous system is enabled to support the IS-IS protocol. Each additional interface of the device in the autonomous system adds an interface IP address information to the TLV accordingly.
该 Ipv6InterfaceAddressTLV的值由地址前缀和前缀长度组成, 其中, 前缀长度占用 1 字节, 地址前缀占用的字节数由前缀长度的值决定。 自治 系 统 内 的 设备 的 接 口 上 每 增 加 一个 IPv6 地址 , 就在 Ipv6InterfaceAddressTLV中添加一项 IPv6地址信息, 并刷新 LSP, 该 LSP 通过洪泛的方式, 发送到自治系统内的所有设备。  The value of the Ipv6InterfaceAddressTLV is composed of an address prefix and a prefix length, where the prefix length occupies 1 byte, and the number of bytes occupied by the address prefix is determined by the value of the prefix length. Each IPv6 address is added to the interface of the device in the autonomous system. An IPv6 address is added to the Ipv6InterfaceAddressTLV and the LSP is refreshed. The LSP is flooded to all devices in the AS.
在图 6中,路由器 Router-A产生的 LSP中的 Ipv6InterfaceAddressTLV 包含接口地址 20 :: 1, 由前缀长度规定的地址前缀为 64位, 该 LSP洪泛给 路由器 Router-B、 Router-C和 Router_D。收到该 LSP的设备解析并获取到 TLV中的接口 IP地址信息。这些信息会与设备自身接口 IP地址信息进行比 较, 如果 TLV中的某项接口 IP地址信息与设备自身上接口 IP地址信息相 等, 进一步比较该 LSP 的发布者是否与本地建立了邻接关系, 如果没有, 那么给网管系统发出告警, 并记录日志。  In Figure 6, the Ipv6InterfaceAddressTLV in the LSP generated by the router Router-A contains the interface address 20:1, and the address prefix specified by the prefix length is 64 bits. The LSP is flooded to the routers Router-B, Router-C, and Router_D. The device that receives the LSP parses and obtains the IP address information of the interface in the TLV. The information is compared with the IP address information of the interface of the device. If the IP address information of an interface in the TLV is the same as the IP address of the interface on the device, the publisher of the LSP is compared with the local device. , then issue an alarm to the network management system and record the log.
类似地, 路由器 Router-D 产生的 Opaque LSA 也会发送给路由器 Router-B、 Router-C和 Router-A,从而图 6中的路由器 Router-A和 Router-D 都会发出告警, 并打印日志信息, 告警内容和日志信息包含冲突设备的 System id, 所属 IS_IS Level , 区域地址等信息。 从而, 管理人员根据网 管告警及日志信息, 可以快速地进行纠正, 解决冲突。 实施例五 通过现有的 IS-IS的 IPv4 TLV来检测 IPv4地址冲突 一种假设的 IP地址发生冲突的自治系统情形, 如图 5所示, 其中地址 为 IPv4地址, IGP选用 IS_IS。四台路由器 Router-A、 Router-B, Router-C 和 Router-D可运行支持 IS-IS协议的进程, 建立 IS-IS邻居关系。 路由器 Router-A和 Router-D的接口 IP地址配置冲突了。 Similarly, the Opaque LSA generated by the router Router-D is also sent to the router. On Router-B, Router-C, and Router-A, Router-A and Router-D in Figure 6 both send alarms and print log information. The alarm content and log information contain the system id of the conflicting device and the IS_IS Level. Information such as the area address. Therefore, according to the network management alarm and log information, the administrator can quickly correct and resolve the conflict. The fifth embodiment detects an IPv4 address conflict by using an existing IS-IS IPv4 TLV. A scenario in which an assumed IP address conflicts, as shown in FIG. 5, where the address is an IPv4 address, and the IGP selects IS_IS. The four routers Router-A, Router-B, Router-C, and Router-D can run IS-IS processes to establish IS-IS neighbor relationships. The IP address configuration of the interface between Router-A and Router-D conflicts.
本发明为检测出该冲突, 采用在 RFC (Request For Comments请求注 解) 1195 中定义了的 TLV, IP Interface Address ( 132 号), 其结构如图 In order to detect the conflict, the present invention adopts the TLV, IP Interface Address (No. 132) defined in the RFC (Request For Comments Request for Comments) 1195, and its structure is as shown in the figure.
11所示。 11 is shown.
虽然可以利用这个 TLV携带接口的地址, 但是由于没有掩码部分, 所 以 TLV中携带的地址信息只能包含地址部分。  Although the address of the interface can be carried by this TLV, since there is no mask part, the address information carried in the TLV can only contain the address part.
自治系统内的设备的接口上每增加一个 IPv4地址,就可以在 132号 TLV 中添加一个地址信息, 并刷新 LSP, 该 LSP通过洪泛的方式, 可发送到自治 系统内的所有设备。  An interface can be added to the TLV 132 and the LSP can be refreshed. The LSP can be sent to all devices in the AS.
在图 5中, 路由器 Router-A产生的 LSP中的 132 TLV包含接口地址 1. 1. 1. 1, 掩码长度为 24位, 该 LSP洪泛给路由器 Router- B、 Router-C和 Router-D。 收到该 LSP的设备解析并获取 TLV中的接口 IP地址信息。 将这 些信息与设备自身接口 IP地址信息进行比较, 如果 TLV中的某项接口 IP 地址信息与设备自身上接口 IP地址信息相等, 进一步比较该 LSP的发布者 是否与本地建立了邻接关系, 如果没有, 那么给网管系统发出告警, 并记 录曰志。  In Figure 5, the 132 TLV in the LSP generated by the router Router-A contains the interface address 1. 1. 1. 1, the mask length is 24 bits, and the LSP is flooded to the routers Router-B, Router-C, and Router- D. The device that receives the LSP parses and obtains the IP address information of the interface in the TLV. The information is compared with the IP address information of the interface of the device. If the IP address information of the interface in the TLV is the same as the IP address of the interface on the device, the publisher of the LSP is compared with the local device. , then send an alarm to the network management system, and record the records.
类似地, 路由器 Router-D 产生的 Opaque LSA 也会发送给路由器 Router-B, Router-C和 Router-A,从而图 5中的路由器 Router-A和 Router-D 都会发出告警, 并打印日志信息, 告警内容和日志信息包含冲突设备的 System id (系统编号), 所属 IS_IS Level (层)、 区域地址等信息。 从而, 管理人员根据网管告警及日志信息, 可以快速地进行纠正, 解决冲突。 实施例六 通过现有的 IS-IS的 IPv6 TLV来检测 IPv6地址冲突 一种假设的 IP地址发生冲突的自治系统情形, 如图 6所示, 其中地址 遵照 IPv6, IGP选用 IS-ISo 四台路由器 Router-A、 Router- B、 Router-C 和 Router-D可运行支持 IS_IS协议的进程,建立 IS-IS邻居关系。 Router_A 和 Router-D的接口 IP地址配置冲突了。 Similarly, the Opaque LSA generated by the router Router-D is also sent to the routers Router-B, Router-C and Router-A, so that the routers Router-A and Router-D in Figure 5 will send out alarms and print log information. The alarm content and log information include the system id (system number) of the conflicting device, the IS_IS Level, and the area address. Therefore, according to the network management alarm and log information, the administrator can quickly correct and resolve the conflict. Embodiment 6 detects an IPv6 address conflict by using an existing IS-IS IPv6 TLV. An autonomous system in which a hypothetical IP address conflicts, as shown in Figure 6, where the address complies with IPv6, and IGP selects IS-ISo four routers Router-A, Router-B, Router-C, and Router-D to run support. The IS-IS process establishes an IS-IS neighbor relationship. The IP address configuration of the interface between Router_A and Router-D conflicts.
本发明为检测出该冲突,采用在 RFC5308中定义了的 TLV, IP Interface In order to detect the collision, the present invention adopts the TLV defined in RFC5308, IP Interface.
Address (232号), 其结构如图 12所示。 Address (No. 232), its structure is shown in Figure 12.
虽然可以利用这个 TLV携带接口地址信息, 但是由于没有前缀长度部 分, 所以 TLV中携带的地址信息只能包含地址前缀部分。  Although the TLV can be used to carry the interface address information, since there is no prefix length part, the address information carried in the TLV can only contain the address prefix part.
自治系统内的设备的接口上每增加一个 IPv6地址,就可以在 232号 TLV 中添加一个地址信息, 并刷新 LSP, 该 LSP通过洪泛的方式, 发送到自治系 统内的所有设备。  Each additional IPv6 address is added to the interface of the device in the autonomous system. You can add an address to the TLV 232 and refresh the LSP. The LSP is flooded to all devices in the AS.
在图 6中, 路由器 Router-A产生的 LSP中的 232 TLV包含接口地址 20 : : 1,由前缀长度规定的地址前缀为 64位,该 LSP洪泛给路由器 Router-B、 Router-C和 Router_D。 收到该 LSP的设备解析并获取到 TLV中的接口 IP 地址信息。 这些信息会与设备自身接口 IP地址信息进行比较, 如果 TLV中 的某项接口 IP地址信息与设备自身上接口 IP地址信息相等, 进一步比较 该 LSP 的发布者是否与本地建立了邻接关系, 如果没有, 那么给网管系统 发出告警, 并记录日志。  In Figure 6, the 232 TLV in the LSP generated by the router Router-A contains the interface address 20: : 1, the address prefix specified by the prefix length is 64 bits, and the LSP is flooded to the routers Router-B, Router-C, and Router_D. . The device receiving the LSP parses and obtains the IP address information of the interface in the TLV. The information is compared with the IP address information of the interface of the device. If the IP address information of an interface in the TLV is the same as the IP address of the interface on the device, the publisher of the LSP is compared with the local device. , then issue an alarm to the network management system and record the log.
类似地, 路由器 Router-D 产生的 Opaque LSA 也会洪泛给路由器 Router-B, Router-C和 Router-A,从而图 6中的路由器 Router-A和 Router-D 都会发出告警, 并打印日志信息, 告警内容和日志信息包含冲突设备的 System id, 所属 IS_IS Level , 区域地址等信息。 从而, 管理人员根据网 管告警及日志信息, 可以快速地进行纠正, 解决冲突。 与现有技术相比,本发明的检测自治系统内 IP地址冲突的方法及设备, 对于 IGP采用 0SPF的情况, 通过新增 opaque LSA类型, 来携带设备的接 口 IP地址信息,并将该 LSA发送到自治系统内的所有设备;或者,对于 IGP 采用 IS-IS的情况, 通过构建携带设备的接口 IP地址信息的 LSP, 并将该 LSP发送到自治系统内的所有设备; 然后, 每台设备进行对比, 可检测出地 址冲突, 从而达到快速检测全网 IP地址冲突的目的。 本领域普通技术人员可以理解实现上述实施例中的全部或部分步骤是 可以通过程序来指令相关的硬件完成, 所述的程序可以存储于计算机可读 存储介质中, 所述存储介质可以是 ROM/RAM, 磁盘或光盘等。 以上所述, 仅为本发明较佳的具体实施方式, 但本发明的保护范围并 不局限于此, 任何熟悉本技术领域的技术人员在本发明揭露的技术范围内, 可轻易想到的变化或替换, 都应涵盖在本发明的保护范围之内。 因此, 本 发明的保护范围应该以权利要求的保护范围为准。 Similarly, the Opaque LSA generated by the router Router-D is also flooded to Router-B, Router-C, and Router-A. The routers Router-A and Router-D in Figure 6 both send alarms and print log information. The alarm content and log information include the system id of the conflicting device, the IS_IS Level, and the area address. Therefore, according to the network management alarm and log information, the administrator can quickly correct and resolve the conflict. Compared with the prior art, the method and the device for detecting the IP address conflict in the autonomous system of the present invention carry the IP address information of the interface of the device by adding the opaque LSA type, and send the LSA to the IGP. To all devices in the autonomous system; or, in the case of IS-IS, the LSP that carries the IP address information of the interface of the device is configured, and the LSP is sent to all devices in the autonomous system; In contrast, an address conflict can be detected, so as to quickly detect the IP address conflict of the entire network. Those of ordinary skill in the art will appreciate that all or part of the steps in implementing the above embodiments are The related hardware may be instructed by a program, and the program may be stored in a computer readable storage medium, which may be a ROM/RAM, a magnetic disk or an optical disk. The above is only a preferred embodiment of the present invention, but the scope of the present invention is not limited thereto, and any person skilled in the art can easily think of changes or within the technical scope disclosed by the present invention. Alternatives are intended to be covered by the scope of the present invention. Therefore, the scope of protection of the present invention should be determined by the scope of the claims.

Claims

权利要求 Rights request
1、 一种检测自治系统内互联网协议 IP地址冲突的方法, 其特征在于, 所述方法包括:  A method for detecting an IP address conflict of an Internet protocol in an autonomous system, the method comprising:
所述自治系统内的设备, 在有新的接口使能内部网关协议时, 构建承 载有所述设备的接口 IP地址信息的报文;  The device in the autonomous system, when a new interface is enabled with the internal gateway protocol, constructs a packet carrying the IP address information of the interface of the device;
将所述报文发送给所述自治系统内的所有设备, 所述报文使所述自治 系统内接收到所述报文的设备, 在所述报文是收到所述报文的设备自身之 外的其他设备生成, 并且所述报文中的 IP地址信息与所述设备自身的接口 IP地址信息相同时, 给出所述自治系统内出现 IP地址冲突的指示。  Transmitting the packet to all devices in the autonomous system, where the packet is used by the device in the autonomous system to receive the packet, where the packet is the device that receives the packet. When other devices are generated, and the IP address information in the packet is the same as the interface IP address information of the device itself, an indication of an IP address conflict in the autonomous system is given.
2、依据权利要求 1所述的方法,其特征在于,所述内部网关协议为 0SPF 协议, 所述自治系统内的设备运行有支持 0SPF协议的进程, 所述报文包括 链路状态通告 LSA。  The method according to claim 1, wherein the internal gateway protocol is an OSSPF protocol, and the device in the autonomous system runs a process that supports the 0SPF protocol, and the packet includes a link state advertisement LSA.
3、 依据权利要求 2所述的方法, 其特征在于, 所述的 LSA的构建过程 具体包括: 构建承载有该设备的接口 IP地址信息的类型长度值 TLV, 用所 述 TLV构建 LSA。  The method according to claim 2, wherein the constructing process of the LSA specifically includes: constructing a type length value TLV carrying the interface IP address information of the device, and constructing the LSA by using the TLV.
4、 依据权利要求 3所述的方法, 其特征在于, 所述 LSA在所述自治系 统内的设备的至少一个接口使能到所述的支持 0SPF协议的进程时产生, 所 述自治系统内的设备每增加一个接口将相应地在增加一个 TLV来承载设备 的接口 IP地址信息。  The method according to claim 3, wherein the LSA is generated when at least one interface of the device in the autonomous system is enabled to the process supporting the 0SPF protocol, and the intra-autonomous system Each additional interface of the device will be correspondingly added with a TLV to carry the interface IP address information of the device.
5、依据权利要求 1所述的方法,其特征在于,所述内部网关协议为 IS-IS 协议, 所述自治系统内的设备运行有支持 IS-IS协议的进程, 所述报文包 括链路状态报文 LSP。  The method according to claim 1, wherein the internal gateway protocol is an IS-IS protocol, and the device in the autonomous system runs a process supporting the IS-IS protocol, and the packet includes a link. Status packet LSP.
6、 依据权利要求 5所述的方法, 其特征在于, 所述的 LSP的构建过程 具体包括: 构建承载有该设备的接口 IP地址信息的类型长度值 TLV, 用所 述 TLV构建 LSP。  The method according to claim 5, wherein the constructing process of the LSP specifically includes: constructing a type length value TLV carrying the IP address information of the interface of the device, and constructing the LSP by using the TLV.
7、 依据权利要求 6所述的方法, 其特征在于, 所述 TLV在所述自治系 统内的设备的至少一个接口使能到所述的支持 IS-IS协议的进程时构建, 所述自治系统内的设备每增加一个接口将相应地在所述 TLV 中增加一项接 口 IP地址信息。  The method according to claim 6, wherein the TLV is constructed when at least one interface of the device in the autonomous system is enabled to the process supporting the IS-IS protocol, the autonomous system Each interface added to the device will add an interface IP address information to the TLV accordingly.
8、 依据权利要求 1至 7中任一项所述的方法, 其特征在于, 所述自治 系统内的设备给出所述自治系统内出现 IP地址冲突的指示具体包括: 向网管系统给出告警; The method according to any one of claims 1 to 7, wherein the indication by the device in the autonomous system that an IP address conflict occurs in the autonomous system comprises: Give an alarm to the network management system;
在设备上记录日志; 或  Log on the device; or
向网管系统给出告警并在设备上记录日志。  Give an alarm to the NMS and log the device.
9、 一种能够检测自治系统内互联网协议 IP地址冲突的设备, 其特征 在于, 包括:  9. A device capable of detecting an Internet Protocol IP address conflict in an autonomous system, the method comprising:
第一模块, 用以在有新的接口使能内部网关协议时, 构建承载有所述 设备的接口 IP地址信息的报文;  The first module is configured to construct a packet carrying the IP address information of the interface of the device when the internal interface protocol is enabled on the new interface;
第二模块, 用以将所述报文发送给所述自治系统内的所有设备, 所述 报文使所述自治系统内接收到所述报文的设备, 在所述报文是收到所述报 文的设备自身之外的其他设备生成, 并且所述报文中的 IP地址信息与所述 设备自身的接口 IP地址信息相同时, 给出所述自治系统内出现 IP地址冲 突的指示。  a second module, configured to send the packet to all devices in the autonomous system, where the packet causes the device in the autonomous system to receive the packet, where the packet is received When the device other than the device itself is generated, and the IP address information in the packet is the same as the interface IP address information of the device itself, an indication of an IP address conflict in the autonomous system is given.
10、 依据权利要求 9所述的设备, 其特征在于, 所述第一模块具体包 括:  The device according to claim 9, wherein the first module specifically includes:
第一单元, 用以构建承载有该设备的接口 IP 地址信息的类型长度值 The first unit, the type length value used to construct the IP address information of the interface carrying the device
TLV; TLV;
第二单元, 用所述 TLV构建所述的报文。  The second unit constructs the message with the TLV.
11、 依据权利要求 9或 10所述的设备, 其特征在于, 所述内部网关协 议为 0SPF协议, 所述设备运行有支持 0SPF协议的进程, 所述报文包括链 路状态通告 LSA。 The device according to claim 9 or 10, wherein the internal gateway protocol is an OSSPF protocol, and the device runs a process that supports the 0SPF protocol, and the packet includes a link state advertisement LSA.
12、 依据权利要求 11所述的设备, 其特征在于, 所述 LSA在所述设备 的至少一个接口使能到所述的支持 0SPF协议的进程时产生, 所述设备每增 加一个接口将相应地在增加一个 TLV来承载设备的接口 IP地址信息。  The apparatus according to claim 11, wherein the LSA is generated when at least one interface of the device is enabled to the process supporting the 0SPF protocol, and each additional interface of the device will be correspondingly Add a TLV to carry the interface IP address information of the device.
13、 依据权利要求 9或 10所述的方法, 其特征在于, 所述内部网关协 议为 IS-IS协议, 所述设备运行有支持 IS-IS协议的进程, 所述报文包括 链路状态报文 LSP。  The method according to claim 9 or 10, wherein the internal gateway protocol is an IS-IS protocol, the device runs a process that supports the IS-IS protocol, and the packet includes a link status report. LSP.
14、 依据权利要求 13所述的方法, 其特征在于, 所述 TLV在所述设备 的至少一个接口使能到所述的支持 IS-IS协议的进程时构建, 所述设备每 增加一个接口将相应地在所述 TLV中增加一项接口 IP地址信息。  The method according to claim 13, wherein the TLV is constructed when at least one interface of the device is enabled to the process supporting the IS-IS protocol, and each interface of the device is added. Correspondingly, an interface IP address information is added to the TLV.
PCT/CN2011/075157 2010-10-30 2011-06-02 Method and device for detecting internet protocol address collision in autonomous system WO2011144139A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201010525432.6 2010-10-30
CN201010525432.6A CN102457407B (en) 2010-10-30 2010-10-30 Method and equipment for detecting IP address conflict in autonomous system

Publications (1)

Publication Number Publication Date
WO2011144139A1 true WO2011144139A1 (en) 2011-11-24

Family

ID=44991202

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2011/075157 WO2011144139A1 (en) 2010-10-30 2011-06-02 Method and device for detecting internet protocol address collision in autonomous system

Country Status (2)

Country Link
CN (1) CN102457407B (en)
WO (1) WO2011144139A1 (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104104598B (en) * 2013-04-09 2019-05-17 中兴通讯股份有限公司 A kind of method and apparatus for realizing IP address notice
CN104506438B (en) * 2015-01-09 2017-06-20 烽火通信科技股份有限公司 The method and system that a kind of DCN leads to certainly
CN105245637B (en) * 2015-10-27 2019-06-25 迈普通信技术股份有限公司 A kind of conflict processing method and equipment
WO2018133051A1 (en) * 2017-01-20 2018-07-26 华为技术有限公司 Address conflict detection method and device
CN108521336B (en) * 2018-03-05 2021-08-03 烽火通信科技股份有限公司 Method and device for controlling IP address conflict of routing networking

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1588905A (en) * 2004-10-18 2005-03-02 中国科学院计算技术研究所 Address automatic distributing method in mobile self organizing network
CN1901551A (en) * 2005-07-19 2007-01-24 上海贝尔阿尔卡特股份有限公司 Repeat address detecting method and its device for supporting IPv6 two layer access net
CN101094168A (en) * 2006-06-22 2007-12-26 华为技术有限公司 Method for discovering unit of route calculation
CN101175000A (en) * 2007-11-22 2008-05-07 华为技术有限公司 Method and device for automatic IP address detection
CN101667965A (en) * 2009-09-29 2010-03-10 华为技术有限公司 Method and routing equipment for generating access control list
US20100094954A1 (en) * 2008-10-10 2010-04-15 Samsung Electronics Co., Ltd. Method and apparatus for resolving ip address collision in remote access service

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8107417B2 (en) * 2006-08-04 2012-01-31 Samsung Electronics Co., Ltd. Method and mobile terminal for allocating IP address in wireless network
CN101656638B (en) * 2009-09-08 2011-10-19 中国科学院计算技术研究所 Inter-domain prefix hijacking detection method for error configuration

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1588905A (en) * 2004-10-18 2005-03-02 中国科学院计算技术研究所 Address automatic distributing method in mobile self organizing network
CN1901551A (en) * 2005-07-19 2007-01-24 上海贝尔阿尔卡特股份有限公司 Repeat address detecting method and its device for supporting IPv6 two layer access net
CN101094168A (en) * 2006-06-22 2007-12-26 华为技术有限公司 Method for discovering unit of route calculation
CN101175000A (en) * 2007-11-22 2008-05-07 华为技术有限公司 Method and device for automatic IP address detection
US20100094954A1 (en) * 2008-10-10 2010-04-15 Samsung Electronics Co., Ltd. Method and apparatus for resolving ip address collision in remote access service
CN101667965A (en) * 2009-09-29 2010-03-10 华为技术有限公司 Method and routing equipment for generating access control list

Also Published As

Publication number Publication date
CN102457407A (en) 2012-05-16
CN102457407B (en) 2014-11-05

Similar Documents

Publication Publication Date Title
CN106878166B (en) Route notification method and device
EP2725743B1 (en) Methods and device for processing location information about fault point
US7433320B2 (en) System and methods for network path detection
EP2996290B1 (en) Packet forwarding method, apparatus, and system
US20140029419A1 (en) System, method and apparatus providing mvpn fast failover
EP2436152B1 (en) Failure localisation in a mpls-tp network
US8605603B2 (en) Route convergence based on ethernet operations, administration, and maintenance protocol
CN100484097C (en) Method for judging pseudo wire connection state in packet-switching network and service apparatus thereof
KR20100105542A (en) Automatic mep provisioning in a link state controlled ethernet network
JP2013541896A (en) Method and apparatus for improving LDP convergence using hierarchical label stacking
WO2019201014A1 (en) Ethernet segment identifier adjacency detection processing method, device, and storage medium
US10924332B2 (en) Node protection for bum traffic for multi-homed node failure
CN101610535A (en) Multilink direct continuous show scape guarantees the method, system and device of BFD conversation stability down
CN111740907A (en) Message transmission method, device, equipment and machine readable storage medium
WO2011144139A1 (en) Method and device for detecting internet protocol address collision in autonomous system
US20110242988A1 (en) System and method for providing pseudowire group labels in a network environment
CN102170390B (en) Method and system for parameter negotiation
EP2832061B1 (en) Pseudowire extended group messaging in a packet switched network
WO2016090815A1 (en) Switching control method and device in deploying high-capacity service
EP2832055B1 (en) Pseudowire groups in a packet switched network
US12021748B2 (en) Exit interface selection based on intermediate paths
US10735252B2 (en) Outside router fault detection
CN114006854A (en) Communication method and network equipment
US11323392B1 (en) Managing split-brain scenario in multi-homed environment
CN114422435A (en) Notification method of interface address, verification method of network equipment accessibility and equipment

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 11783056

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 11783056

Country of ref document: EP

Kind code of ref document: A1